U.S. patent application number 11/695980 was filed with the patent office on 2008-10-09 for system and method for controlling secured transaction using directionally coded account identifiers.
Invention is credited to Gene S. Fein, Edward Merritt.
Application Number | 20080245855 11/695980 |
Document ID | / |
Family ID | 39826088 |
Filed Date | 2008-10-09 |
United States Patent
Application |
20080245855 |
Kind Code |
A1 |
Fein; Gene S. ; et
al. |
October 9, 2008 |
SYSTEM AND METHOD FOR CONTROLLING SECURED TRANSACTION USING
DIRECTIONALLY CODED ACCOUNT IDENTIFIERS
Abstract
A control method and system provides coded access to a system by
acquiring account identification data corresponding to a
combination of a plurality of symbols. The account identification
data is transmitted, for example to a remote server, to correlate
the account identification data against an account database to
evaluate corresponding account information. Based on the account
information, access to the system may be controlled.
Inventors: |
Fein; Gene S.; (Lenox,
MA) ; Merritt; Edward; (Lenox, MA) |
Correspondence
Address: |
Stolowitz Ford Cowger LLP
621 SW Morrison St, Suite 600
Portland
OR
97205
US
|
Family ID: |
39826088 |
Appl. No.: |
11/695980 |
Filed: |
April 3, 2007 |
Current U.S.
Class: |
235/380 ;
235/494; 705/44 |
Current CPC
Class: |
Y10S 283/904 20130101;
G06Q 20/206 20130101; G06Q 20/385 20130101; G06Q 20/40 20130101;
G06Q 20/20 20130101; G06Q 20/04 20130101 |
Class at
Publication: |
235/380 ;
235/494; 705/44 |
International
Class: |
G06K 5/00 20060101
G06K005/00 |
Claims
1. A method for providing controlled coded access to a
transactional system comprising: receiving a request for access to
a transactional system on an incoming connection, the request
including account identification data corresponding to a
combination of a plurality of symbols; correlating the account
identification data against an account database to evaluate
corresponding account information; and controlling access to the
transactional system based on evaluated account information.
2. The method of claim 1 wherein the account identification data is
audio data, including a series of sounds, each sound corresponding
to a symbol.
3. The method of claim 1 wherein the transactional system is a
credit card system, debit card systems, or banking system.
4. The method of claim 1 wherein the combination of a plurality of
symbols is a combination of twelve symbols.
5. The method of claim 4 wherein the combination of a plurality of
symbols is selected from a range of 100 or more individual
symbols.
6. The method of claim 1 wherein the symbols are directional
symbols
7. A method for providing coded access to a transactional system
comprising: acquiring account identification data, wherein the
account identification data corresponds to a combination of a
plurality of symbols; transmitting a request for access to a
transactional system, the request including the account
identification data; correlating the account identification data
against an account database to evaluate corresponding account
information; and controlling access to the transactional system
based on evaluated account information.
8. The method of claim 7 wherein the account identification data is
audio data including a series of sounds, each sound corresponding
to a symbol.
9. The method of claim 8 wherein the sounds include voice data.
10. The method of claim 8 wherein the sounds include audio
tones.
11. The method of claim 7 wherein the transactional system is a
credit card system, debit card system, or banking system.
12. The method of claim 7 wherein the combination of a plurality of
symbols is a combination of plural symbol arrays.
13. The method of claim 12 wherein the combination of a plurality
of symbols is selected from a range of 100 or more individual
symbols.
14. The method of claim 7 wherein acquiring account identification
data includes optical scanning the combination of a plurality of
symbols from an account card.
15. The method of claim 14 wherein acquiring account identification
data further comprises converting optically scanned symbols into a
series of sounds, each sound corresponding to a respective
symbol.
16. The method of claim 7 wherein acquiring account identification
data includes receiving symbols selection information from a
graphical user interface.
17. The method of claim 7 wherein the symbols include directional
symbols.
18. A computer readable medium having computer readable program
codes embodied therein for causing a computer to function as a
transaction unit that provides coded access to a transactional
system, the computer readable medium program codes performing
functions comprising: receiving a request for access to a
transactional system on an incoming connection, the transaction
request including account identification data corresponding to a
combination of a plurality of symbols; correlating the account
identification data against an account database to evaluate
corresponding account information; and controlling access to the
transactional system based on evaluated account information.
19. A card for providing access to a transactional system for
conducting a transaction comprising: a card; and human readable
account identification data located on the card, the account
identification information corresponding to a combination of a
plurality of symbols that corresponds to an account in an account
database to identify a user in a transaction.
20. The card of claim 19 further comprising: machine readable
information located on the card corresponding to the human readable
account identification data.
21. A system for conducting a transaction comprising: means for
acquiring account identification data, wherein the account
identification data corresponds to a combination of a plurality of
symbols; means for transmitting a transaction request to access a
transactional system, the transaction request including the account
identification data; means for correlating the account
identification data against an account database to evaluate
corresponding account information; and means for controlling access
to the transactional system based on evaluated account
information.
22. A system for providing access to a transactional system: an
acquisition unit configured to accept account identification data,
wherein the account identification data corresponds to a
combination of a plurality of symbols, and to transmit a request
for access to a transactional system to a transaction unit, the
request including the account identification data; an account
database configured to store account information; a transaction
unit configured to (i) receive a request for access to a
transactional system from an acquisition device, (ii) correlate the
account identification data against the account database, (iii)
evaluate corresponding account information, and (iv) provide access
to the transactional system based on evaluated account
information.
23. The system of claim 22 further wherein the acquisition unit
further includes: an audio acquisition device configured to receive
a voice data identification and to process the voice data
identification into the account identification data using a look up
table.
24. The system of claim 22 wherein the acquisition unit includes an
optical scanner configured to acquire symbols from a card.
25. The system of claim 24 wherein the acquisition unit further
includes: a database containing a look up table where audio data
corresponds to a specific symbol; is further configured to convert
symbols acquired from the optical scanner into a combination of a
plurality of audio data based on the look up table, and to transmit
the account identification data as a plurality of audio data.
26. The system of claim 25 wherein the transaction unit further
includes: a conversion database containing a conversion look up
table where audio data corresponds to a specific symbol; and is
further configured to convert audio data received from the
acquisition unit into a combination of a plurality of symbols based
on the conversion look up table.
27. Electromagnetic signals propagating on a computer network,
embodied therein for causing a computer to function as a
transaction unit that provides coded access to a transactional
system, the computer readable medium program codes performing
functions comprising: receiving a request for access to a
transactional system, the transaction request including account
identification data corresponding to a combination of a plurality
of symbols; correlating the account identification data against an
account database to evaluate corresponding account information; and
controlling access to the transactional system based on evaluated
account information.
Description
BACKGROUND OF THE INVENTION
[0001] Credit and debit cards are widely used to conduct commerce
across the globe. The current credit card system has been largely
based on a coding of alphanumeric characters on the front of the
card that make up the credit card account numbers, along with
characters on the front and back of the cards or other security
devices such as holographic stickers to provide secondary security
and identification measures. Magnetic stripes on the back of cards
are also a common feature. These stripes are used to encode a
secure, unique digital data sequence that is read by the electronic
magnetic card reader stripe swiping system and used to validate the
card at manned and automated retail checkout counters. In utilizing
these basic systems, as well as other systems, the credit card
business has enjoyed a business that has grown in size each year
with hundreds of billions of dollars spent by consumers with credit
and debit cards each year.
[0002] The current system for coding and verifying credit card
accounts and corresponding security checks is well established. For
transactions occurring over the phone, or for online transactions,
credit card users often input both their primary card account
number, as well as, a secondary account number and an expiration
date. Additionally, card account holders may be asked to input
their address and sometimes even personal pin numbers. In some
cases, they may be asked to answer a personal question stored by
the card company, such as the name of their "favorite pet" or their
"mother-in-law."
[0003] Conventional models address the need to create unique
account numbers, and to provide other means to verify those account
numbers and their corresponding users. These other means include
the use of an expiration date or security code printed on the front
and back of a card, or the use of a magnetic stripe holding
programmed information. The magnetic stripe is an institutionalized
technology in the credit and debit card industry. Today financial
cards all follow the ISO standards to ensure read reliability world
wide and along with transit cards constitute the largest users of
magnetic stripe cards.
[0004] The magnetic stripe is written and read in much the same way
that audio recording tape is written and read, except that the data
are binary digits--1s and 0s--instead of sounds. The magnetic
stripe is made of a material that can be magnetized. To write data
onto the stripe, the card is dragged over a tiny electromagnet.
Pulses of electrical current are pushed through the electromagnet
windings in one direction or the other, to magnetize tiny spots on
the stripe material. Perhaps one direction of magnetization
represents a "1" while the opposite direction represents a "0"; but
more likely a slightly more complicated system is used. Companies
that deal with these cards have agreed among themselves how to use
arrangements of 1s and 0s to represent the letters and numbers that
they want to store on the stripe.
[0005] To read the data, the card is dragged over a tiny coil of
wire. Movement of the magnetized spots past the coil causes small
electrical voltages to appear in the coil, and from these voltages
the stored 1s and 0s can be deduced. In practice, the coil used to
read the stripe is very similar to the electromagnet used to write
the stripe. These electromagnets are mounted in "write heads" and
"read heads", which typically hold not one but several
electromagnets, side by side, so that several "tracks" of
magnetized spots are written and read simultaneously.
[0006] A standard card employing a magnetic stripe may have any of
three tracks, or a combination of these tracks. Track 1 was the
first track standardized. This layout was developed by the
International Air Transportation Association (IATA) and is still
reserved for their use. The layout includes 210 bits per inch
("bpi"), meaning the number or 0s or 1s that one head can write on
each inch of stripe, with room for 79 numeric characters. It
includes the primary account number (up to 18 digits) and the
account holder's name (up to 26 alphanumeric characters).
[0007] Track 2 was developed by the American Bankers Association
(ABA) for on-line financial transactions. This layout includes 75
bpi with room for 40 numeric characters. It includes the account
number (up to 19 digits).
[0008] Track 3 is also used for financial transactions. The
difference is its read/write ability. The layout includes 210 bpi
with room for 107 numeric digits. It also includes an enciphered
PIN, country code, currency units, amount authorized, subsidiary
account information and other restrictions.
[0009] Instead of, or in addition to simply using magnetic stripes
that store data, cards may also contain microcontrollers that store
data and run programs. These "smartcards" contain an internal
microcontroller that runs a program as soon as it is inserted in a
smartcard socket. The firmware running in the smartcard is an
interpreter with a passive nature, which means that instead of
initiating its own actions, it merely responds in a predetermined
way to commands sent in from the outside world. Furthermore, like
most modern microcontrollers, its program memory can be locked so
that it can be neither examined nor modified by any external means.
Smartcards generally contain encryption routines built in their
firmware. The combination of the three aforementioned
characteristics makes these devices particularly well suited for
applications requiring high security.
[0010] Furthermore, another security measure includes the use of
optical memory cards. Optical memory cards use a technology similar
to the one used with music CDs or CD ROMs. A panel of the "gold
colored" laser sensitive material is laminated in the card and is
used to store the information. The material is comprised of several
layers that react when a laser light is directed at them. The laser
burns a tiny hole (2.25 microns in diameter) in the material which
can then be sensed by a low power laser during the read cycle. The
presence or absence of the burn spot indicates a "one" or a "zero."
Because the material is actually burned during the write cycle, the
media is a write once read many (WORM) media and the data is non
volatile (not lost when power is removed).
[0011] Optical cards can currently store between 4 and 6.6 MB of
data which gives the ability to store graphical images (e.g.
photographs, logos, fingerprints, x-rays, etc.). The data is
encoded in a linear x-y format. ISO/IEC 11693 and 11694 standards
provide details regarding the encoding format. The primary users of
optical technology today are: the medical and healthcare industry;
prepaid debit cards; cargo manifests; admission pass season
tickets; auto maintenance records; and retail purchase cards and
RFID embedded chips to help ensure security, validity and proper
use of the credit or debit cards.
SUMMARY OF THE INVENTION
[0012] Unfortunately, the existing conventional systems have
certain limitations in use and deployment. To start with, an
alphanumeric system has certain base limitations due to the number
of total characters in use that make up the combination of numbers
or letters in an account number. For instance, an alphanumeric
character set that includes 36 total characters has exponentially
fewer possible combinations than an identification set that
includes millions of possible characters. As credit cards suffer
billions of dollars per year in fraud and piracy, the idea of
extending the number of characters that make up account numbers and
security codes may be one way to reduce fraud and piracy.
[0013] The magnetic stripe and database elements in the credit card
business used as the primary methods to corroborate automatic data
collection and identification for credit and debit card users are
also long established systems that create few barriers to
imposters. Similarly, although the implementation of security
measures such as RFID and microprocessor implementation within
cards certainly help the situation, these uses are only safeguards
against specific types of uses, namely retail transactions, either
manned or unmanned. Magnetic stripes, microprocessors and RFID
chips installed within credit cards do nothing to stem the flow of
online, mail/courier or phone transactions as the magnetic stripes,
microprocessor or RFID chip need to be deployed locally to validate
the card further.
[0014] The existing credit card system, including the basic account
number system, has been in place for decades. As a consistent and
single platform for the credit and debit card industry, it has also
been susceptible for fraudulent attack precisely because it
provides an established target to focus upon to find solutions to
hack the credit card systems in a variety of ways.
[0015] Accordingly, there is a need for a new, integrated system
that replaces the well established way to create and code credit
cards and debit cards. The new system integrates newer methods into
the coding of credit card and debit card accounts, and combines
those methods with newer available security measures within the
card. The external innovations of this system include redefining
the basic database coding elements and programming structure that
processes, verifies, communicates and houses credit card data. This
system will create the flexibility to define many more account code
combinations in a manner that leaves the vast majority of possible
account code combinations unused. As the security measures and
increased card code combinations of the system are used in tandem,
the credit card system as a whole becomes less susceptible to fraud
and abuse. Further, the data will be transported by the reader
systems in a way that is entirely new, low cost, built in order to
add on to existing standards and ensures a higher degree of
accuracy and fraud protection while guarding against misuse.
[0016] The present invention relates to the creation of a credit,
debit or security code system that uses a pool of non-alphanumeric
symbols as unique sequenced account identifiers where a match is
then sought by the system between the symbols and other
corresponding data transmissions to make secure account
verifications from central and sub-central data and data
verification points. According to principles of the present
invention, a method and corresponding system provides coded access
to a system by acquiring account identification data corresponding
to a combination of a plurality of the non-alphanumeric symbols.
The account identification data is transmitted to a remote server
to correlate the account identification data against an account
database to evaluate corresponding account information. Based on
the account information, access to the system may be
controlled.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] The foregoing will be apparent from the following more
particular description of example embodiments of the invention, as
illustrated in the accompanying drawings in which like reference
characters refer to the same parts throughout the different views.
The drawings are not necessarily to scale, emphasis instead being
placed upon illustrating embodiments of the present invention.
[0018] FIG. 1 is a schematic view of the front of a card that may
be used in systems according to principles of the present
invention;
[0019] FIG. 2 is a schematic view of the front of another card that
may be used in systems according to principles of the present
invention;
[0020] FIGS. 3A and 3B illustrate symbols in exemplary directional
orientations that may be used in systems according to principles of
the present invention;
[0021] FIG. 4 is a symbol set that may be used in systems according
to principles of the present invention;
[0022] FIG. 5 is a schematic view of the back of another card that
may be used in systems according to principles of the present
invention;
[0023] FIG. 6 is a schematic view of the back of another card that
may be used in systems according to principles of the present
invention;
[0024] FIG. 7 is a schematic view of the back of another card that
may be used in systems according to principles of the present
invention;
[0025] FIG. 8 is a block diagram of a system according to
embodiments of the present invention;
[0026] FIG. 9 is a flowchart illustrating an embodiment of the
present invention;
[0027] FIG. 10 is an illustration of the digital symbol visualizer
that may be used at a visual acquisition unit according to
principles of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0028] A description of example embodiments of the invention
follows.
[0029] According to principals of the present invention, a system
may use directional symbols, or characters, as available individual
coding elements deployed in combination to create a new
transactional account management system, such as a credit card,
debit card, or gift card system. The symbols may be used to create
account identification data, account codes, or what is currently
referred to as credit or debit card `account numbers.`
[0030] The front of the cards used in systems according to
principles of the present invention are aesthetically pleasing.
FIG. 1 illustrates the front of a card 100 that may be used in a
system according to principles of the present invention. Typically,
a string or series of numerals (written digits) represents the
credit or debit card account number. These numerals (digits) may be
removed completely from the card. Instead, the numerals may be
replaced by a pleasant grouping of symbols, giving the card a
"hieroglyphic" effect. The individual symbols used in the system
may be stored in a database correlating to respective names, such
as "shamrock" or "up arrow" and used in the system as a combination
on the credit and debit cards to create individual cardholder
account numbers.
[0031] In the embodiment shown in FIG. 1, the combination of a
plurality of symbols is a combination of twelve symbol arrays, or
character arrays. For organizational purposes, the twelve arrays
have been arranged in four groups of three symbol arrays 110A-C,
120A-C, 130A-C, and 140A-C. As in typical credit or debit card
systems, the front of the card displays the authorized user
(account holder) name 150, along with the expiration date 160. In
addition to the card having the account number shown encoded with
symbols, auxiliary coding for security may also exist, such as a
4-symbol, quick security code element (not shown in FIG. 1). This
may be used in tandem with holographic watermarks 170 and other
combinations of security measures already existing in the art.
[0032] FIG. 2 illustrates the front of another card 200 that may be
used in systems according to principles of the present invention.
The card of FIG. 2 contains the same elements as shown in FIG. 1,
but also includes each symbol array individually labeled 210 to
provide a user with instant identification of the symbols. By
providing a written description of a symbol and/or its directional
orientation, a user or vendor may more easily identify and enter
the account information into the transactional system.
[0033] One of ordinary skill in the art will recognize that many
different symbol sets may be applied in accordance with principles
of the present invention. The sets may be customized such that more
than the 36 alpha numeric characters are available. Individual
characters may be directionally oriented to provide even more
possible combinations. For example, in FIG. 3A, a shamrock is shown
oriented in the "North" pointing position, whereas the shamrock in
FIG. 3B is shown oriented in the "East" pointing position. With
various vendors employing their own distinctive symbol sets, a
simple, yet supplementary layer of encryption may be provided to
deter fraudulent transactions. For example, FIG. 4 shows an
exemplary symbol set that may be used in connection with a system
according to embodiments of the present invention. Other symbol
sets ranging from less than 100 individual symbols to over 100
symbols may be utilized. As shown in the symbols of FIG. 4,
depending on a symbol's symmetry, a given symbol may have one
orientation (or directions), two orientations, or four
orientations.
[0034] FIGS. 5, 6 and 7 illustrate the backs of cards according to
principles of the present invention. In FIG. 5, the back of a card
500 has a standard signature area 510 that provides a section for
the user account holder to provide an authorized signature. In
addition, the card includes an embedded flash drive 520, and a
microprocessor 530. Flash drives or other non-volatile memory may
hold account information corresponding to the symbol coded account
identification data located on the front of the card.
Alternatively, the flash drive 520 may store auxiliary information
that provide additional security for any transaction with the card
500. In embodiments of the present invention discussed in further
detail below, each individual symbol in the system may correspond
to, or represent, an individual tone or sound that is coded in a
database to create a match from the individual symbol to the
individual tone or sound. The account identification data of a user
may be stored in the flash drive 520. A microprocessor 530, such as
a smart card and/or optical card processor, may be deployed within
the card. This is accomplished using known techniques such as those
by Zeit Controls by Zeit Controls BasicCard or other established
manufacturing processes for smart card or optical card
implementation into credit or debit card configurations.
[0035] FIG. 6 illustrates the back of another card that may be used
in connection with the present invention. The card 600 includes an
Radio Frequency Identification (RFID) tag 620 in addition a
microprocessor 530. The RFID tag may be used in connection with
acquisition systems employing RFID readers.
[0036] FIG. 7 illustrates the back of a yet another card 700 that
may be used in connection with the present invention. In FIG. 7,
the familiar magnetic stripe 710 still holds down its customary
position on the back of the card in black or brown, and may store
account information along with auxiliary symbol codes for security
purposes. As with the other devices described above, corresponding
audio information may also be stored upon the magnetic stripe of
the card and passed with a modified ISO compliant scanner to the
verification, banking or central cardholder databases. The magnetic
stripe may also function solely as is traditionally applied with
magnetic stripes using the 3 sections of data available for object
code to be written onto them in a way which is completely compliant
with ISO standards.
[0037] FIG. 8 illustrates a system according to principles of the
present invention. embodiments of the present invention provide
coded access to a system by acquiring account identification data
corresponding to a combination of a plurality of symbols. In an
embodiment of the present invention, an acquisition unit such as a
personal computer 830, a telephone 840, magnetic strip reader 850,
an optical scanner 860, or a modified optical scanner 870 provides
a user access point to a network 810 for transmitting a transaction
request to a transaction unit 820. The transaction unit 820 may
receive a request for access to a transactional system from an
acquisition unit, the request including the account identification
data. The transaction unit 820 may also be in communication with an
account database 825, either local or remote, distributed, or
central, or other configuration. The account database 825 may store
user account information, such as account information for credit
cardholders.
[0038] On a given card 100, 200, 500, 600, 700 each individual
symbol may correspond to, or represent a respective tone or sound
that is coded in a database, such as account database 825 of FIG.
8. The invention embodiment creates a match between the individual
symbol and the respective tone or sound. In use, the individual
tones or sounds are transferred to the database 825 after the
sounds from the card have been read by the invention system. For
example, audio data comprising a series of sounds may be entered
into the system from telephone 840. The sounds may be entered as
"touch tone" sounds from a telephone keypad, or as voice data read
by a user. The reader system can be similar to a Dragon Systems
technology that allows for the reading and matched tagging of
sounds, similar to how voice tags are read and then matched by a
cell phone for access to stored data. The combination of read
sounds is then matched in the database 825 to corresponding
symbols, which are then constructed in order to yield the symbol
combination that comprises the debit or credit card holders'
account code (account number of the card).
[0039] In other embodiments, an optical scanner 860 may acquire the
series of symbols from a card and using image processing
techniques, discriminate between the various symbols and their
orientation within a system. In yet other embodiments a specialized
optical scanner 870 may similarly acquire the series of symbols
from a card, and convert the individual symbols into a series of
sounds. The sounds or tones may be stored on an optical card whose
data can be transmitted by an addition 675 to ISO compliant card
scanners 870 in the form of a small ROM or RAM reader and storage
system. Using these series of sounds as account identification
data, the sounds may be sent through the network and matched at the
transaction unit 820 with an account database 825. On skilled in
the art will recognize that the account identification comprising
sounds or tones representing each symbol may be stored on a smart
card processor, which can hold this data along with other important
data. The scanner may then utilize the readers' modem connection to
pass on this information to the database.
[0040] One skilled in the art will recognize that the system shown
in FIG. 8 illustrates a high level network, and that consistent
with principles of the present invention, data transmissions for
secure account verifications may be made in other network
configurations at central and sub-central data and data
verification points.
[0041] FIG. 9 illustrates an exemplary transaction flow according
to principles of the present invention. A consumer card holder
seeking to make a purchase provides a vendor with a card. At step
910, the card is swiped though a reader, such as magnetic render
850 or optical scanner 860 of FIG. 8 to acquire account
identification data corresponding to a combination of a plurality
of symbols. At step 920, the point of sale vendor dials a number to
call the transaction unit 820 and transmits the credit card
authentication request, including the account information, through
a network 810. At step 930, upon receiving a request for access to
a transaction system, the transaction unit 820 of FIG. 8 may access
the account database 825 and correlate the account identification
data from a request with data in account database 825. At step 940,
the transaction unit determines whether to establish access based
on the correlation of the request against account database 825.
Depending on any number of criteria determined by a transactional
system, (e.g. account verification, credit limits, account status,
stolen card status), the transaction will be allowed 950, or denied
960.
[0042] As discussed above, the request for a transaction may occur
through any number of account acquisition units at a point of sale.
For example, a telephone 840 may acquire the account identification
data from a user and transmit the transaction request through a
public switched telephone network (PSTN) 842 through a switch 844
to the network 810. In terms of online, phone or mail transactions,
the user simply fills in the account number query by reading the
printed names of the symbols off of the card in sequence, such as,
"My account number is circle, north pointing shamrock, fire, log
cabin, well, asterisk, rectangle and solid square."
[0043] FIG. 10 illustrates a graphical user interface 1000 that may
be used in connection with on-line transactions from a personal
computer 830 of FIG. 8, or from any acquisition unit that may
employ a graphical user interface such as an automated teller
machine ("ATM"). Symbols may be selected from a special menu 1010
that lists all the symbols and provides fine display tools based
upon an intuitive interface that provides for easy identification
of characters. As a user scrolls through the organized symbol
options/potential selections, he may select 1030 the symbols
corresponding to his own account identification. In the user
interface 1000 of FIG. 8, a separate frame or workspace 1020 for
account identification shows to the user the symbol selections he
has made. While using the GUI interface on-line or at an ATM, a
built in memory to the symbol selection defines a symbol selection
interface that can allow users to leave `bread crumbs` to locate
their symbol combinations in the future more fluidly and store and
deploy their symbol account codes with a single click. Symbols can
be located alphabetically, and/or with a Braille interface for
visually impaired people or for people who simply prefer to locate
their account numbers in this manner.
[0044] Those of ordinary skill in the art should recognize that
methods involved in a method and system for providing coded access
to a system may be embodied in a computer program product that
includes a computer usable medium. For example, such a computer
usable medium can include a readable memory device, such as a solid
state memory device, a hard drive device, a CD-ROM, a DVD-ROM, or a
computer diskette, having stored computer-readable program code
segments. The computer readable medium can also include a
communications or transmission medium, such as electromagnetic
signals propagating on a computer network, a bus or a
communications link, either optical, wired, or wireless, carrying
program code segments as digital or analog data signals. The
program code enables and supports computer implementation of the
operations described in FIG. 9 or other embodiments.
[0045] While this invention has been particularly shown and
described with references to example embodiments thereof, it will
be understood by those skilled in the art that various changes in
form and details may be made therein without departing from the
scope of the invention encompassed by the appended claims.
[0046] For example, the foregoing describes, by way of illustration
and not limitation, use of the present invention in financial
transaction systems. Other systems in which the present invention
may be employed include security systems (where the card provides a
security ease code or security access number) and other systems
having encoded user account-type numbers.
[0047] The foregoing refers to transactional system use/embodiment
of the present invention. Other types of systems, e.g., security
systems, identity verification systems and more, may also employ
the present invention.
* * * * *